General description [Документация VAS Experts]

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
en:dpi:dpi_options:opt_ddos:ddos_ddos:ddos_ddos_description [2020/04/21 14:05] lexx26en:dpi:dpi_options:opt_ddos:ddos_ddos:ddos_ddos_description [2024/09/26 15:29] (current) – external edit 127.0.0.1
Line 1: Line 1:
-====== General description ======+====== General description ======
 {{indexmenu_n>1}} {{indexmenu_n>1}}
 A hacker possesses a large network of remotely controlled computers (BOTNET) in order to perform DDoS attack. There is no need to hide IP addresses of these computers((Sure BOTNET can be used to enforce ordinary DoS attacks)). The hacker can just imitate legit users' activity. However, due to the large number of computers used for the attack (up to hundreds thousands sometimes), this activity overloads the site and leads to the denial of service. Hackers typically employ the heaviest requests to the site under attack. This reduces the number of computers used for the attack. The IP addresses of these computers will be known after the attack. A hacker possesses a large network of remotely controlled computers (BOTNET) in order to perform DDoS attack. There is no need to hide IP addresses of these computers((Sure BOTNET can be used to enforce ordinary DoS attacks)). The hacker can just imitate legit users' activity. However, due to the large number of computers used for the attack (up to hundreds thousands sometimes), this activity overloads the site and leads to the denial of service. Hackers typically employ the heaviest requests to the site under attack. This reduces the number of computers used for the attack. The IP addresses of these computers will be known after the attack.